Sciweavers

6195 search results - page 56 / 1239
» Cloud Computing Security
Sort
View
95
Voted
COMPUTER
2010
84views more  COMPUTER 2010»
15 years 8 days ago
When TV Dies, Will It Go to the Cloud?
Karin Breitman, Markus Endler, Rafael Pereira, Mar...
118
Voted
IEEEARES
2010
IEEE
15 years 10 months ago
Program Obfuscation by Strong Cryptography
—Program obfuscation is often employed by malware in order to avoid detection by anti-virus software, but it has many other legitimate uses, such as copy protection, software lic...
Zeljko Vrba, Pål Halvorsen, Carsten Griwodz
SIGGRAPH
2010
ACM
15 years 8 months ago
Ambient point clouds for view interpolation
View interpolation and image-based rendering algorithms often produce visual artifacts in regions where the 3D scene geometry is erroneous, uncertain, or incomplete. We introduce ...
Michael Goesele, Jens Ackermann, Simon Fuhrmann, C...
155
Voted
SGP
2004
15 years 6 months ago
Comparing Point Clouds
Point clouds are one of the most primitive and fundamental surface representations. A popular source of point clouds are three dimensional shape acquisition devices such as laser ...
Facundo Mémoli, Guillermo Sapiro
120
Voted
CLOUDCOM
2010
Springer
15 years 1 months ago
Cost-Optimal Outsourcing of Applications into the Clouds
Abstract--Commercial services for provisioning software components and virtual infrastructure in the cloud are emerging. For customers, this creates a multitude of possibilities fo...
Immanuel Trummer, Frank Leymann, Ralph Mietzner, W...